• Title/Summary/Keyword: aAuthentication

Search Result 3,417, Processing Time 0.034 seconds

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

Study for Inferior Alveolar and Lingual Nerve Damages Associated with Dental Local Anesthesia (치과 국소마취와 관련된 하치조신경과 설신경 손상에 대한 연구)

  • Lee, Byung-Ha;Im, Tae-Yun;Hwang, Kyung-Gyun;Seo, Min-Seock;Park, Chang-Joo
    • Journal of The Korean Dental Society of Anesthesiology
    • /
    • v.10 no.2
    • /
    • pp.172-177
    • /
    • 2010
  • Background: Damages of trigeminal nerve, particularly inferior alveolar nerve and lingual nerve, could occur following dental procedures. In some cases, nerve damage may happen as a complication of the local anesthetic injection itself and not of the surgical procedure. Methods: From September 2006 to August 2010, 5 cases of inferior alveolar nerve and lingual nerve damages, which were assumed to happen solely due to local anesthesia, were reviewed. All cases were referred to Division of Oral and Maxillofacial Surgery, Department of Dentistry, Hanyang University Medical Center for legal authentication in the process of criminal procedure. Results: In all five cases, patients complained of altered sensation occurred in the distribution of the inferior alveolar or lingual nerve following block anesthesia. The local anesthetics were 2% lidocaine with 1 : 100,000 epinephrine and the amount of local anesthetics, which were used during injection, were varied. Most of patients experienced the electric stimulation during injection. Recovery was poor and professional supportive care was mostly absent. Conclusions: Dental practitioners should consider that the surgical procedure caused the trigeminal nerve damage, however, dental local anesthesia for inferior alveolar nerve and lingual nerve could be one of the causes for damages. The various mechanisms for nerve damages by local anesthesia are thoroughly discussed.

Identification of Marker Nucleotides for the Molecular Authentication of Araliae Continentalis Radix Based on the Analysis of Universal DNA Barcode, matK and rbcL, Sequences (범용성 DNA 바코드(matK, rbcL) 분석을 통한 독활(獨活) 유전자 감별용 Marker Nucleotide 발굴)

  • Kim, Wook Jin;Yang, Sungyu;Choi, Goya;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.31 no.5
    • /
    • pp.15-23
    • /
    • 2016
  • Objectives : Araliae Continentalis Radix and Angelicae Pubescentis Radix have been used as the same medicinal name Korean and Chinese traditional medicines, respectively. The authentic Araliae Continentalis Radix is described only the root of Aralia continentalis in the Korean Pharmarcopoeia. However, the dried root of Angelica biserrata, Levisticum officinale, or Heracleum moellendorffii also has been distributed adulterants of Araliae Continentalis Radix. To develop a reliable method for identifying Araliae Continentalis Radix from adulterants, we carried out the analyses of universal DNA barcode sequences.Methods : Four plants species were collected from different habitate and nucleotide sequences of matK and rbcL were analyzed. The species-specific sequences and phylogenetic relationship were estimated using entire sequences of two DNA barcodes, respectively.Results : In comparative analysis of matK sequences, we were identified 104 positions of marker nucleotide for Ar. continentalis, 3 for An. biserrata, 4 for L. officinale and 8 for H. moellendorffii enough to distinguish individual species, respectively. Furthermore, we obtained marker nucleotides in rbcL at 42 positions for Ar. continentalis, 5 for An. biserrata and 2 for H. moellendorffii, but not for L. officinale. The phylogenetic tree of matK and rbcL were showed that all samples were clustered into four groups constituting homogeneous clades within the species.Conclusions : We confirmed that species-specific marker nucleotides of matK sequence provides distinct genetic information enough to identify four species. Therefore, we suggest that matK gene is useful DNA barcode for discriminating authentic Araliae Continentalis Radix from inauthentic adulterants.

Molecular Authentication of Magnoliae Flos Using Robust SNP Marker Base on trnL-F and ndhF Region

  • Kim, Min-Kyeoung;Noh, Jong-Hun;Yan, Deok-Chun;Lee, Sanghun;Lee, Hee-Nyeong;Jin, Chi-Gyu
    • Korean Journal of Plant Resources
    • /
    • v.28 no.3
    • /
    • pp.341-349
    • /
    • 2015
  • Magnoliae Flos (Sini in Korean) is one of the most important oriental medicinal plants. In the Korean Herbal Pharmacopeia, the bud of the all species in Manolia denudate and Manolia genus were regarded as the botanical sources for ‘Sini’. Most the dried bud of Manolia denudata, Manolia biondii and Manolia sprengeri were used as ‘Xin-yi’ in China. Therefore, the purpose of this study was to determine and compare the ‘Magnolia’ species, four species including Manolia denudata, M. biondii, M. liliiflora and M. Kobus were analysis of sequencing data revealed DNA polymorphisms. The based on tRNA coding leucine/phenylalanine (trnL-F) and NADH-plastoquinone oxidoreductase subunit 5 (ndhF) sequences in chloroplast DNA. For the identification of ‘Magnolia’ species, polymerase chain reaction (PCR) analysis of chloroplast DNA regions such as ndhF have proven an appropriate method. A single nucleotide polymorphism (SNP) has been identified between genuine “Sini” and their fraudulent and misuse. Specific PCR primers were designed from this polymorphic site within the sequence data, and were used to detect true plants via multiplex PCR.

Curriculum model plans to extend the IP training base (IP(지식재산권) 교육 저변확대를 위한 교과운영모델 방안)

  • Jo, Jaeshin;Song, Yosoon
    • Journal of Digital Contents Society
    • /
    • v.17 no.5
    • /
    • pp.329-338
    • /
    • 2016
  • As the creative economy is considered important recently, learner-centered IP(Intellectual Property) education has proliferated rapidly to universities, and there are greater attention and demand on IP education. On the other hand, there are lack of curriculums and an accreditation for IP education. This paper is to propose IP education module and emphasize the need of the accreditation for IP education and its authentication plan. This paper will also show the need of specialists and educational curriculum in the field of IP, the current status and the analyse of the IP education, and the trend of IP courses in intellectual-property-leading universities. It subsequently examines the domestic education accreditation system and the National Competency Standard(NCS) curriculum and suggests the IP education 8 courses model as a curriculum management model, the standard curriculum of the IP educational system, and the instructional module.

Analysis of Causal Relationship among TQM Implementation Factors, Managerial Goals of Production System and Organizational Performance, Using Path Analysis (경로분석을 이용한 TQM실행요인, 생산관리 목표와 경영성과 간의 인과관계분석)

  • Lee Jin Choon;Lee Sang Jin;Lee Hong Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.1
    • /
    • pp.16-27
    • /
    • 2005
  • This study tried to test hypotheses, using path analysis, whether the implementation factors of TQM have influences to organization performance through achieving the managerial goals of production, or not. This is an attempt to perform comprehensive analysis instead of using the simple correlation approach between the implementation factors and performances. In order to perform the empirical test, this study has surveyed 98 firms which acquired the ISO authentication and analyzed the data using the path analysis of AMOS. After testing the hypotheses of this study, the cause factor, i.e. TQM implementation factor, has effective influences to the goals of production system, and, also, the goals have a significant influence to managerial performance. Therefore, this study concludes that the implementation factors of TQM have significant effects on the managerial performance.

  • PDF

A Study on Analysis and Countermeasure of Security threat in NFC (NFC 서비스 보안 위협 분석 및 대응방안 연구)

  • Kim, Hyung-Uk;Kim, Hyung-joo;Kang, Jung-ho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.183-191
    • /
    • 2016
  • Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.

Design and embodiment of XrML Document editing system for digital contents copyright administration (디지털 컨텐츠 저작권 관리를 위한 XrML 문서편집 시스템의 설계 및 구현)

  • 임지훈;강치원;정회경;최범석;홍진우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.368-372
    • /
    • 2002
  • Channel of distribution of contents of digitalised multimedia contents is changing in form passed directly to consumer from manufacturer through digital network of high speed. Together, diffusion of various digital equipment that do is changing Past multimedia consumption structure with the wonderful speed so that can consume easily digital contents. Specially, Multimedia Personal Computer and fast diffusion of a digital television are acting role such as catalyst that promote easy purchase and consumption of multimedia contents of good qualify. However, this system is no method that can sell digital contents and express right that original owner for the contents can insist nothing but consume. Because consumer can distribute to another person copying contents that buy because of and user can distribute producing ashes again according to necessary field by oneself as well as, can lose meaning for original contents. In this paper, Text editing system for XrML (extensible Rights Markup Language) that describe about integrity of message and entity authentication in addition to necessary rights, fees, condition etc. and this to do fetters XML (eXtensible Markup Language) for copyright protection for digital contents in treatise that see hereupon and use digital contents design and embody.

  • PDF

Digital Video Watermarking Using Block Reordering Algorithm Based on DCT (DCT 기반의 블록 재정렬 알고리즘을 이용한 디지털 비디오 워터마킹)

  • Kim Kyoung-Sik;Park Kyung-Jun;Ko Hyung Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.696-705
    • /
    • 2005
  • The rapid progress of the software has enabled individuals to copy and remake digital contents, which was only done by professionals. However, this rapid growth of software has brought many other defects. As a solution to the problems, contents producer needs to have certification and inspection of its contents text and hold the proprietary rights. In this paper, the new video watermarking scheme is proposed which is appropriate for the requirements mentioned for digital video contents and it is applied to MPEG-2 video encoder and decoder. In order to insert watermark sequence for digital video data, watermarking used blocks reordering algorithm and SCL(secret code list). It is satisfied two properties of cryptography that confidentiality and integrity. We test the proposed algorithm to see its performance in terms of watermark capacity, compression robustness and visual quality impact. According to the experiment of proposed watermarking algorithm, we obtained satisfactory results that watermark can still be extracted after MPEG-2 re-encoding at lower bit rates. It is important property for data hiding and user authentication in video data.

A Study of Security Policy for U-Healthcare Service (U-Healcare 서비스를 위한 보안정책에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.747-751
    • /
    • 2013
  • Researches on U-Healthcare service integrating medical information and IT technologies are actively conducted. U-Healthcare service is the next generation's medical paradigm that ensures conveniences to many users so that the society recognizes the importance and attempts for commercialization through various business model are performed. To form such U-Healthcare service market safely, various policies on the social structure should be established through the standard and the medical law to systemize of the medical information led by the governmen. Especially, the government's security policy to ensure the safety for the government leading visualization of U-Healthcare should be firmly established. Firstly, this paper presents U-healthcare Service and policy guideline. Secondly, it analyzes security threatening factors for the safe U-Healthcare service. By classifying the analyzed security threatening factors based on three major elements of the security, Confidentiality, Integrity and Availability of security policy for each element is proposed.